AUGUST 2008
New Targets in Detection (July 2008)

ADWARE
Adware.ActiveSearch Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
Adware.Adsquash
Adware.Barogo
Adware.LordPatch
Adware.Monker
Adware.PointShock
Adware.Gratis
Adware.NoName
Adware.BBT

BACKDOORS
Win32.Backdoor.Fosen Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.
Win32.Backdoor.Hrvg
Win32.Backdoor.Imort
Win32.Backdoor.Inuk
Win32.Backdoor.Janker
Win32.Backdoor.Jord
Win32.Backdoor.Jtram
Win32.Backdoor.JustJoke
Win32.Backdoor.Killtroj
Win32.Backdoor.LanaFTP
Win32.Backdoor.Last2000
Win32.Backdoor.Nefutur
Win32.Backdoor.Nemesis
Win32.Backdoor.Penrox
Win32.Backdoor.Pipes
Win32.Backdoor.Qrat
Win32.Backdoor.Remoper
Win32.Backdoor.RemoteHack
Win32.Backdoor.Retribution
Win32.Backdoor.Rosyba
Win32.Backdoor.Rserver
Win32.Backdoor.RSM
Win32.Backdoor.RTB
Win32.Backdoor.SchoolBus
Win32.Backdoor.Sean
Win32.Backdoor.Sepro
Win32.Backdoor.SerialPager
Win32.Backdoor.Shaden
Win32.Backdoor.SheepGoat
Win32.Backdoor.Sherlock
Win32.Backdoor.Silencer
Win32.Backdoor.SkSocket
Win32.Backdoor.SkyDance
Win32.Backdoor.Spookdoor
Win32.Backdoor.Subsari
Win32.Backdoor.Supcount
Win32.Backdoor.Sysad
Win32.Backdoor.SystemDebug
Win32.Backdoor.T06
Win32.Backdoor.Talex
Win32.Backdoor.Tasmer
Win32.Backdoor.ThunderKiss
Win32.Backdoor.Titidoor
Win32.Backdoor.Tiul
Win32.Backdoor.Tourniq
Win32.Backdoor.Tsunami
Win32.Backdoor.Uhil
Win32.Backdoor.Whisper
Win32.Backdoor.Wollf
Win32.Backdoor.XConsole
Win32.Backdoor.XHX
Win32.Backdoor.Zalivator
Win32.Backdoor.Zany
Win32.Backdoor.Zombam
Win32.Backdoor.Rootcip
Win32.Backdoor.Silly
Win32.Backdoor.SkyFire
Win32.Backdoor.SkyRat
Win32.Backdoor.Slandor
Win32.Backdoor.SpyKing
Win32.Backdoor.Tjspec
Win32.Backdoor.TMS
Win32.Backdoor.Ultor
Win32.Backdoor.Under
Win32.Backdoor.Undernet
Win32.Backdoor.Wowhack
Win32.Backdoor.Wukaz
Win32.Backdoor.Xanadu
Win32.Backdoor.XBot
Win32.Backdoor.Zenmaster
Win32.Backdoor.Zerg
Win32.Backdoor.Elfnet
Win32.Backdoor.Eljefe
Win32.Backdoor.Filth
Win32.Backdoor.Frapes
Win32.Backdoor.Fratool
Win32.Backdoor.Gaura
Win32.Backdoor.Gbot
Win32.Backdoor.HackPack
Win32.Backdoor.Hftp
Win32.Backdoor.InetWatch
Win32.Backdoor.Insect
Win32.Backdoor.InsultMedia
Win32.Backdoor.Izeburn
Win32.Backdoor.Kikz
Win32.Backdoor.Klepto
Win32.Backdoor.Kronikal
Win32.Backdoor.Mayhem
Win32.Backdoor.MDM
Win32.Backdoor.MeetTheLamer
Win32.Backdoor.Metarage
Win32.Backdoor.MeteorBot
Win32.Backdoor.Mutabor
Win32.Backdoor.Mydons
Win32.Backdoor.Nakter
Win32.Backdoor.Nao
Win32.Backdoor.NetSnooper
Win32.Backdoor.Nucker
Win32.Backdoor.Nucledor
Win32.Backdoor.Nutbus
Win32.Backdoor.Nyrobot
Win32.Backdoor.Pet
Win32.Backdoor.Petador
Win32.Backdoor.Predator
Win32.Backdoor.Redghost
Win32.Backdoor.RedHacker
Win32.Backdoor.RedHors
Win32.Backdoor.Remotcon
Win32.Backdoor.RemoteConnection
Win32.Backdoor.Revenger
Win32.Backdoor.Revise
Win32.Backdoor.RMFdoor
Win32.Backdoor.RMT
Win32.Backdoor.RtKit
Win32.Backdoor.Shabo
Win32.Backdoor.Sinit
Win32.Backdoor.Sixer
Win32.Backdoor.SlenfBot
Win32.Backdoor.Spydoor
Win32.Backdoor.Spyhuq
Win32.Backdoor.Sytr
Win32.Backdoor.T543
Win32.Backdoor.Titanium
Win32.Backdoor.Toledorz
Win32.Backdoor.Tramin
Win32.Backdoor.Transistor
Win32.Backdoor.Unwind
Win32.Backdoor.Upfudoor
Win32.Backdoor.Uploader
Win32.Backdoor.Vatos
Win32.Backdoor.Wifer
Win32.Backdoor.Wilba
Win32.Backdoor.Winroot
Win32.Backdoor.WinSatan
Win32.Backdoor.VisualServer
Win32.Backdoor.VoiceSpy
Win32.Backdoor.Voodoo
Win32.Backdoor.XZone
Win32.Backdoor.Y2Kcount
Win32.Backdoor.Yat
Win32.Backdoor.YLYShell
Win32.Backdoor.Youpeer
Win32.Backdoor.Comlabat
Win32.Backdoor.Brewer
Win32.Backdoor.ioFtpd
Win32.Backdoor.Krepper
Win32.Backdoor.Resumdor
Win32.Backdoor.Senik
Win32.Backdoor.Tonerok
Win32.Backdoor.Depot
Win32.Backdoor.H3
Win32.Backdoor.Loony
Win32.Backdoor.Xhaker
Win32.Backdoor.XPthree
Win32.Backdoor.LeVision
Win32.Backdoor.Zapulko

DIALERS
Win32.Dialer.PluginAccess Dialers are programs that utilize a computer's modem to make calls or access services. Users may want to remove dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

DOWNLOADERS
Win32.Downloader.Apher Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
Win32.Downloader.Setial
Win32.TrojanDownloader.Stubby
Win32.TrojanDownloader.Comet
Win32.TrojanDownloader.Cray
Win32.TrojanDownloader.Greetyah
Win32.TrojanDownloader.G-Spot
Win32.TrojanDownloader.Guardian
Win32.TrojanDownloader.Gunix
Win32.TrojanDownloader.Jexprox
Win32.TrojanDownloader.Junet
Win32.TrojanDownloader.LiveUp
Win32.TrojanDownloader.Lol
Win32.TrojanDownloader.Mendwar
Win32.TrojanDownloader.Micro
Win32.TrojanDownloader.Minstaller
Win32.TrojanDownloader.Pomponi
Win32.TrojanDownloader.Pornet
Win32.TrojanDownloader.Presario
Win32.TrojanDownloader.Procexe
Win32.TrojanDownloader.Pupper
Win32.TrojanDownloader.Dozdl
Win32.TrojanDownloader.Drap
Win32.TrojanDownloader.Iowa
Win32.TrojanDownloader.Krepper
Win32.TrojanDownloader.NoName
Win32.TrojanDownloader.Nooper
Win32.TrojanDownloader.Petrolin
Win32.TrojanDownloader.Pitux
Win32.TrojanDownloader.Renegad
Win32.TrojanDownloader.Revop
Win32.TrojanDownloader.Rotarran
Win32.TrojanDownloader.SpyAgent
Win32.TrojanDownloader.Ultimx
Win32.TrojanDownloader.Aqtemp
Win32.TrojanDownloader.Fokin
Win32.TrojanDownloader.Clisser
Win32.TrojanDownloader.Gooochi
Win32.TrojanDownloader.PCClient
Win32.TrojanDownloader.Pugeju
Win32.TrojanDownloader.Bambs
Win32.TrojanDownloader.Lastad
Win32.TrojanDownloader.SecondThought
Win32.TrojanDownloader.Vixup
Win32.TrojanDownloader.FTPod
Win32.TrojanDownloader.Mypay
Win32.TrojanDownloader.Pendix
Win32.TrojanDownloader.Todon
Win32.TrojanDownloader.Maresa
Win32.TrojanDownloader.IEAVCodec
Win32.TrojanDownloader.Fearless
Win32.TrojanDownloader.Sfn
Win32.TrojanDownloader.Tearspear

E-MAIL FLOODERS
Win32.EmailFlooder.Avril E-mail flooders provide functionality that make it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make
Win32.EmailFlooder.Botmailer
Win32.EmailFlooder.Foxers
Win32.EmailFlooder.Netghost
Win32.EmailFlooder.Yaemb
Win32.EmailFlooder.Yahooer
Win32.EmailFlooder.Zeropopup

FLOODERS
Win32.IMFlooder.Ifu Flooders may provide functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.
Win32.Flooder.Annoyer
Win32.Flooder.Fatalf
Win32.Flooder.Freden
Win32.Flooder.Rod
Win32.Flooder.Yaa
Win32.Flooder.Dcpm
Win32.Flooder.Deface
Win32.Flooder.Fremmy
Win32.Flooder.MrType
Win32.Flooder.Mrudp
Win32.Flooder.Msmh
Win32.Flooder.Notten
Win32.Flooder.Pinger
Win32.Flooder.PortFlooder
Win32.Flooder.QQdodo
Win32.Flooder.Retun
Win32.IMFlooder.Hityou
Win32.IMFlooder.Icnewq
Win32.IMFlooder.Icub
Win32.Flooder.AUR
Win32.Flooder.Bigfly
Win32.Flooder.Blomes
Win32.Flooder.Bombit
Win32.Flooder.Callbox
Win32.Flooder.Crew
Win32.Flooder.Daniel
Win32.Flooder.DirectBlaster
Win32.Flooder.Flomaster
Win32.Flooder.Floodster
Win32.Flooder.IntelIRC
Win32.Flooder.Isis
Win32.Flooder.Itaq
Win32.Flooder.JavBomber
Win32.Flooder.Lanmen

NUKERS
Win32.Nuker.Medal Nukers are used to harm other computers over the Internet, making them crash or reboot.
Win32.Nuker.NNKiller
Win32.Nuker.NukeQQ
Win32.Nuker.Oob
Win32.Nuker.Pof
Win32.Nuker.Rebirth
Win32.Nuker.Rocket
Win32.Nuker.Samnuk
Win32.Nuker.Eniac
Win32.Nuker.Hunuker
Win32.Nuker.IceNuker

PASSWORD STEALERS
Win32.Trojan-PWS.Alerternt Password stealers can steal user passwords on an infected system, compromising system security and user privacy.
Win32.Trojan-PWS.Amenby
Win32.Trojan-PWS.Aras
Win32.Trojan-PWS.Caca
Win32.Trojan-PWS.Citifraud
Win32.Trojan-PWS.Crazer
Win32.Trojan-PWS.Deintel
Win32.Trojan-PWS.Firtal
Win32.Trojan-PWS.Freeone
Win32.Trojan-PWS.Mirpin
Win32.Trojan-PWS.Netax
Win32.Trojan-PWS.Shrin
Win32.Trojan-PWS.Sniffor
Win32.Trojan-PWS.Zipun
Win32.Trojan-PWS.Aletc
Win32.Trojan-PWS.Apem
Win32.Trojan-PWS.Aquafish
Win32.Trojan-PWS.Arpa
Win32.Trojan-PWS.Atomic
Win32.Trojan-PWS.Atrar
Win32.Trojan-PWS.Fixerror
Win32.Trojan-PWS.Goti
Win32.Trojan-PWS.Grabber
Win32.Trojan-PWS.Greg
Win32.Trojan-PWS.Huopass
Win32.Trojan-PWS.Iceman
Win32.Trojan-PWS.ICQDelf
Win32.Trojan-PWS.Navral
Win32.Trojan-PWS.Nemotron
Win32.Trojan-PWS.QQGame
Win32.Trojan-PWS.QQgetPass
Win32.Trojan-PWS.QQMusic
Win32.Trojan-PWS.QQNum
Win32.Trojan-PWS.QQShou
Win32.Trojan-PWS.QQSpy
Win32.Trojan-PWS.Salva
Win32.Trojan-PWS.Santosa
Win32.Trojan-PWS.Sendkey
Win32.Trojan-PWS.SMTPTest
Win32.Trojan-PWS.Thif
Win32.Trojan-PWS.Vxskey
Win32.Trojan-PWS.Xport
Win32.Trojan-PWS.XpPasslogger
Win32.Trojan-PWS.Basi
Win32.Trojan-PWS.Belial
Win32.Trojan-PWS.Brain
Win32.Trojan-PWS.Brutus
Win32.Trojan-PWS.Faxu
Win32.Trojan-PWS.Hazif
Win32.TrojanPWS.Heak
Win32.TrojanPWS.HermanAgent
Win32.TrojanPWS.Kedad
Win32.TrojanPWS.Kervar
Win32.Trojan-PWS.Maul
Win32.Trojan-PWS.Mefs
Win32.Trojan-PWS.Misos
Win32.Trojan-PWS.QQeye
Win32.Trojan-PWS.QQHacker
Win32.Trojan-PWS.Qwz
Win32.Trojan-PWS.WebCamNow
Win32.Trojan-PWS.Winpwd
Win32.Trojan-PWS.Zagaban
Win32.TrojanPWS.OrkutPass
Win32.Trojan-PWS.Tibia

ROGUE ANTI-SPYWARE APPLICATIONS
Systemantivirus 2008 Rogue anti-spyware applications may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.
VistaAntivirus 2008
InternetSecurityDeluxe
MalwaerProtector
PestSweeper
RealAntiSpyware
SwiftCleaner
Ultimateantivirus 2008
VitaeAntiVirus2008
VaccineFree
Advanced Antivirus
Malware Protector 2008
Antivirus XP 2008
PC-Antispy
PC-Cleanpro
WinDefender2008
Antivirus2009
DoctorAntivirus2008
TotalAntivirus
WinXSecurityCenter
WistaAntivirus
YourWebSafe

TROJANS
Win32.Trojan.Apagar Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.
Win32.Trojan.Berok
Win32.Trojan.Chernich
Win32.Trojan.Dbit
Win32.Trojan.Delalot
Win32.Trojan.DusBunn
Win32.Trojan.Ezu
Win32.Trojan.FakeMSN
Win32.Trojan.FakeRM
Win32.Trojan.Fudor
Win32.Trojan.GetWrong
Win32.Trojan.Henged
Win32.Trojan.Lazar
Win32.Trojan.Liquid
Win32.Trojan.Nonaco
Win32.Trojan.PSWEY
Win32.Trojan.Tooner
Win32.Trojan.Wren
Win32.Trojan.Concon
Win32.Trojan.Condrag
Win32.Trojan.FakeGina
Win32.Trojan.Affc
Win32.Trojan.Almaeda
Win32.Trojan.Amber
Win32.Trojan.Annoyer
Win32.Trojan.Anspy
Win32.Trojan.AntiAVG
Win32.Trojan.AolAgent
Win32.Trojan.Atendo
Win32.Trojan.AuthStealer
Win32.Trojan.AutoAccepter
Win32.Trojan.Avrown
Win32.Trojan.BlackBird
Win32.Trojan.BlockInput
Win32.Trojan.BlueBoy
Win32.Trojan.Boa
Win32.Trojan.Bombat
Win32.Trojan.Boomer
Win32.Trojan.Botten
Win32.Trojan.CDOpen
Win32.Trojan.Colmatch
Win32.Trojan.Colorbug
Win32.Trojan.Colorer
Win32.Trojan.ConfigLoop
Win32.Trojan.Conip
Win32.Trojan.Conlock
Win32.Trojan.Control
Win32.Trojan.Cool
Win32.Trojan.Delcab
Win32.Trojan.delsha
Win32.Trojan.Deser
Win32.Trojan.DirRename
Win32.Trojan.Diskfill
Win32.Trojan.Doth
Win32.Trojan.Dremn
Win32.Trojan.Drox
Win32.Trojan.Drwaup
Win32.Trojan.Ezoons
Win32.Trojan.Fakeaol
Win32.Trojan.Faker
Win32.Trojan.FindVm
Win32.Trojan.ForYou
Win32.Trojan.Fotish
Win32.Trojan.Freecd
Win32.Trojan.FreeInet
Win32.Trojan.Fursto
Win32.Trojan.GabanBus
Win32.Trojan.Gertex
Win32.Trojan.GhostToolz
Win32.Trojan.Guide
Win32.Trojan.Hakan
Win32.Trojan.Hallowav
Win32.Trojan.Hangup
Win32.Trojan.Haptk
Win32.Trojan.Havoc
Win32.Trojan.HDDKill
Win32.Trojan.Heised
Win32.Trojan.HideAll
Win32.Trojan.HK
Win32.Trojan.HLJacker
Win32.Trojan.Hohack
Win32.Trojan.Hola
Win32.Trojan.Homepage
Win32.Trojan.Hooker
Win32.Trojan.ImageKiller
Win32.Trojan.ImageThief
Win32.Trojan.IntraSpyServer
Win32.Trojan.ITIS
Win32.Trojan.Keylopws
Win32.Trojan.Killer
Win32.Trojan.KillSysbckup
Win32.Trojan.Koska
Win32.Trojan.Ksiwin
Win32.Trojan.LaSta
Win32.Trojan.Liech
Win32.Trojan.Locamel
Win32.Trojan.Lorer
Win32.Trojan.Lottery
Win32.Trojan.Lotto
Win32.Trojan.Loven
Win32.Trojan.LoveYou
Win32.Trojan.Macur
Win32.Trojan.MakeDirs
Win32.Trojan.Masta
Win32.Trojan.Masterlock
Win32.Trojan.MAV
Win32.Trojan.MBT
Win32.Trojan.Mecool
Win32.Trojan.Medel
Win32.Trojan.Mole
Win32.Trojan.Msnimb
Win32.Trojan.MSNTrick
Win32.Trojan.Mutacao
Win32.Trojan.NewsFlood
Win32.Trojan.NexZus
Win32.Trojan.NightMare
Win32.Trojan.NikoMac
Win32.Trojan.Norcis
Win32.Trojan.Nostart
Win32.Trojan.Nullpos
Win32.Trojan.NuttyMouse
Win32.Trojan.NYG
Win32.Trojan.Oberststen
Win32.Trojan.Oblom
Win32.Trojan.Onban
Win32.Trojan.Panic
Win32.Trojan.Parody
Win32.Trojan.Partcom
Win32.Trojan.PassDel
Win32.Trojan.PimpCo
Win32.Trojan.PiratHack
Win32.Trojan.Pirdir
Win32.Trojan.Plik
Win32.Trojan.Pluder
Win32.Trojan.Pocks
Win32.Trojan.PowerOff
Win32.Trojan.Project
Win32.Trojan.QuickBrowser
Win32.Trojan.Raampjes
Win32.Trojan.Randya
Win32.Trojan.RASHangUp
Win32.Trojan.Rashar
Win32.Trojan.RCmos
Win32.Trojan.Reopener
Win32.Trojan.Rtms
Win32.Trojan.Samb
Win32.Trojan.Santa
Win32.Trojan.Scagent
Win32.Trojan.SchoolBug
Win32.Trojan.Sconato
Win32.Trojan.Screen
Win32.Trojan.SCSpy
Win32.Trojan.Searex
Win32.Trojan.Siloth
Win32.Trojan.Slider
Win32.Trojan.Socket
Win32.Trojan.SocksProxy
Win32.Trojan.Sole
Win32.Trojan.SomeTrouble
Win32.Trojan.Splash
Win32.Trojan.Spolash
Win32.Trojan.Spooner
Win32.Trojan.Sporke
Win32.Trojan.Stervis
Win32.Trojan.Susear
Win32.Trojan.Sysag
Win32.Trojan.Systrace
Win32.Trojan.Systry
Win32.Trojan.Tagrecall
Win32.Trojan.Tapeworm
Win32.Trojan.Teardrop
Win32.Trojan.TimeGluk
Win32.Trojan.Tix
Win32.Trojan.TMSD
Win32.Trojan.Toad
Win32.Trojan.Vdmrun
Win32.Trojan.Websearch
Win32.Trojan.Weird
Win32.Trojan.Wimail
Win32.Trojan.Winboot
Win32.Trojan.WinCheck
Win32.Trojan.Winduke
Win32.Trojan.WinErase
Win32.Trojan.WinInfo
Win32.Trojan.Voltaol
Win32.Trojan.ZaKiller
Win32.Trojan.Zaman
Win32.Trojan.Candun
Win32.Trojan.Anomaly
Win32.Trojan.DelAutoexec
Win32.Trojan.Hosfre
Win32.Trojan.Killfw
Win32.Trojan.Cutwail
Win32.Trojan.ExplorerHijack
Win32.Trojan.Runas
Win32.Trojan.Speed
Win32.Trojan.Bagle
Win32.Trojan.Lame
Win32.Trojan.News
Win32.Trojan.Peed
Win32.Trojan.Mailfinder
Win32.Trojan.PrivacySet
Win32.Trojan.ConnectionService
Win32.Trojan.Nosok
Win32.Trojan.Tmep
Win32.Trojan.Mezzia

TROJAN.CLICKERS
Win32.TrojanClicker.Exploider Trojan.Clickers may cause the victim's machine to contact a target webpage without the user's knowledge or consent to falsify data about the number of times the webpage is visited.
Win32.TrojanClicker.Ledos
Win32.TrojanClicker.Libie
Win32.TrojanClicker.Lopin
Win32.TrojanClicker.Mangto
Win32.TrojanClicker.Mobs
Win32.TrojanClicker.Zerro
Win32.TrojanClicker.Cibula
Win32.TrojanClicker.IntelliAdvert
Win32.TrojanClicker.Jpgnet
Win32.TrojanClicker.Morwill
Win32.TrojanClicker.Oleloa
Win32.TrojanClicker.Qabar
Win32.TrojanClicker.Redir

TROJAN DDOS APPLICATIONS
Win32.TrojanDDoS.Delf TrojanDDoS applications provide functionality that make it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for example, disturb communication services or make various systems unresponsive.
Win32.TrojanDDoS.Resod
Win32.TrojanDDoS.Desex
Win32.TrojanDDoS.Dest
Win32.TrojanDDoS.TCPSpeed
Win32.TrojanDDoS.Winsys

TROJAN.DROPPERS
Win32.Trojan-Dropper.FC Trojan.Droppers will drop additional files on the infected system. These files are often other Trojans or downloaders.
Win32.Trojan-Dropper.Glue
Win32.Trojan-Dropper.Ineb
Win32.Trojan-Dropper.Lazarus
Win32.Trojan-Dropper.Pakes
Win32.Trojan-Dropper.BHO
Win32.Trojan-Dropper.Exec
Win32.Trojan-Dropper.Fesber
Win32.Trojan-Dropper.MSWord.Agent
Win32.Trojan-Dropper.Pecodrop
Win32.Trojan-Dropper.PegaJoiner
Win32.Trojan-Dropper.Pizdrop
Win32.Trojan-Dropper.Sekan
Win32.Trojan-Dropper.SendWM
Win32.Trojan-Dropper.Sobig
Win32.Trojan-Dropper.SOFTWAR
Win32.Trojan-Dropper.Sohs
Win32.Trojan-Dropper.Spon
Win32.Trojan-Dropper.SpoofBot
Win32.Trojan-Dropper.Star
Win32.Trojan-Dropper.Valsday
Win32.Trojan-Dropper.WinAD
Win32.Trojan-Dropper.Winmult
Win32.Trojan-Dropper.Wolfst
Win32.Trojan-Dropper.Xaw
Win32.Trojan-Dropper.Daoh
Win32.Trojan-Dropper.Dater
Win32.Trojan-Dropper.DBL
Win32.Trojan-Dropper.Googite
Win32.Trojan-Dropper.GR
Win32.Trojan-Dropper.Gred
Win32.Trojan-Dropper.Loring
Win32.Trojan-Dropper.Wardat
Win32.Trojan-Dropper.Vigvam
Win32.TrojanDropper.Teesken
Win32.Trojan-Dropper.Binder
Win32.TrojanDropper.BSOD
Win32.TrojanDropper.Mutant
Win32.TrojanDropper.Parsi

TROJAN.NOTIFIERS
Win32.TrojanNotifier.Coorat Trojan.Notifiers are Trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing system vulnerability. Trojan.Notifiers may thereby compromise system security and user privacy.
Win32.TrojanNotifier.Feares
Win32.TrojanNotifier.Illnotifier

TROJAN.PROXIES
Win32.TrojanProxy.Mads Trojan.Proxies may open up the infected machine to be used as a proxy server.
Win32.TrojanProxy.Fireby
Win32.TrojanProxy.Redbind
Win32.TrojanProxy.Regate
Win32.TrojanProxy.Chubot
Win32.TrojanProxy.Groworm
Win32.TrojanProxy.Guzuloh
Win32.TrojanProxy.Hino
Win32.TrojanProxy.Prohax
Win32.TrojanProxy.Proix
Win32.TrojanProxy.Ralex

TROJAN.SPIES
Win32.TrojanSpy.Coiboa Trojan.Spies are a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.
Win32.TrojanSpy.Dumarin
Win32.TrojanSpy.Globar
Win32.TrojanSpy.Kaiserlog
Win32.TrojanSpy.Paladin
Win32.TrojanSpy.Passoner
Win32.TrojanSpy.WinEggDrop
Win32.TrojanSpy.WMPatch
Win32.TrojanSpy.Yitai
Win32.TrojanSpy.Aimspy
Win32.TrojanSpy.Apikey
Win32.TrojanSpy.Dgs
Win32.TrojanSpy.Excon
Win32.TrojanSpy.FakeUnit
Win32.TrojanSpy.Hotworld
Win32.TrojanSpy.Keystate
Win32.TrojanSpy.KeyTrap
Win32.TrojanSpy.Mslagent
Win32.TrojanSpy.MSNLogThief
Win32.TrojanSpy.Muon
Win32.TrojanSpy.PCspy
Win32.TrojanSpy.DoubleWM
Win32.TrojanSpy.Harvester
Win32.TrojanSpy.Hookey
Win32.TrojanSpy.HookInput
Win32.TrojanSpy.HttpLogger
Win32.TrojanSpy.IamBigBrother
Win32.TrojanSpy.Nags
Win32.TrojanSpy.PestLogger
Win32.TrojanSpy.Skin98
Win32.TrojanSpy.TapTrap
Win32.TrojanSpy.Taskplaner
Win32.TrojanSpy.Temporizador
Win32.TrojanSpy.Luzia
Win32.TrojanSpy.FTPSend
Win32.TrojanSpy.PCAgent

VIRUSES
Win32.Virus.Bube Viruses are code that recursively replicate a possibly evolved copy of itself. Viruses infect a Host File or system area, or they simply modify a reference to such objects to take control and then multiply again to form new generations.

WORMS
Win32.P2PWorm.Inter Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.
Win32.P2PWorm.KeyGener
Win32.P2PWorm.Lolol
Win32.P2PWorm.Picsys
Win32.P2PWorm.Risday
Win32.P2PWorm.Togod
Win32.Worm.Afire
Win32.Worm.Animan
Win32.Worm.Arman
Win32.Worm.Atirus
Win32.Worm.Banwor
Win32.Worm.Bropia
Win32.Worm.Crybot
Win32.Worm.Cult
Win32.Worm.Dander
Win32.Worm.Dinkdink
Win32.Worm.Dotor
Win32.Worm.Funsoul
Win32.Worm.Gokar
Win32.Worm.Harwig
Win32.Worm.Israz
Win32.Worm.Kibuv
Win32.Worm.Krynos
Win32.Worm.Lastas
Win32.Worm.Limar
Win32.Worm.Monkey
Win32.Worm.Nakrom
Win32.Worm.Opasoft
Win32.Worm.Pakota
Win32.Worm.Perser
Win32.Worm.Pluto
Win32.Worm.Rantis
Win32.Worm.Rosarenda
Win32.Worm.SdBoter
Win32.Worm.Secet
Win32.Worm.Shansai
Win32.Worm.Yahoxer
Win32.P2PWorm.Bereb
Win32.P2PWorm.Carfin
Win32.P2PWorm.Druagz
Win32.P2PWorm.Irkaz
Win32.P2PWorm.Kamadina
Win32.P2PWorm.Kamafe
Win32.P2PWorm.Kanyak
Win32.P2PWorm.Kazeus
Win32.P2PWorm.Mua
Win32.P2PWorm.Multex
Win32.P2PWorm.Nopadex
Win32.P2PWorm.P2Load
Win32.P2PWorm.Sharan
Win32.P2PWorm.Shermnar
Win32.P2PWorm.Shower
Win32.P2PWorm.Smeet
Win32.P2PWorm.Warlor
Win32.P2PWorm.Weakas
Win32.P2PWorm.Vifter
Win32.P2PWorm.Wix
Win32.P2PWorm.Woned
Win32.Worm.Aler
Win32.Worm.Bauka
Win32.Worm.Bolgi
Win32.Worm.Bored
Win32.Worm.Bormex
Win32.Worm.Botter
Win32.Worm.Breacuk
Win32.Worm.Breaker
Win32.Worm.DipNet
Win32.Worm.DoomHunter
Win32.Worm.Ezio
Win32.Worm.Francette
Win32.Worm.Freity
Win32.Worm.Haltura
Win32.Worm.Headout
Win32.Worm.Hiton
Win32.Worm.Hofox
Win32.Worm.Jared
Win32.Worm.Jitux
Win32.Worm.Kergez
Win32.Worm.Lebreat
Win32.Worm.Legemir
Win32.Worm.Lewor
Win32.Worm.Lioten
Win32.Worm.Listas
Win32.Worm.Lunor
Win32.Worm.Magcall
Win32.Worm.Mellon
Win32.Worm.Memas
Win32.Worm.Mydoom
Win32.Worm.Myfip
Win32.Worm.Myhar
Win32.Worm.Netlip
Win32.Worm.Nevereg
Win32.Worm.Poffer
Win32.Worm.Pogard
Win32.Worm.Potar
Win32.Worm.Prototide
Win32.Worm.Redrac
Win32.Worm.Refoav
Win32.Worm.Renol
Win32.Worm.Runouce
Win32.Worm.Salga
Win32.Worm.Smelles
Win32.Worm.Snaky
Win32.Worm.Socay
Win32.Worm.Spoder
Win32.Worm.Stap
Win32.Worm.Webdav
Win32.Worm.Yodo
Win32.Worm.Yoseni
Win32.Worm.Zeynep
Win32.P2PWorm.Cabby
Win32.P2PWorm.Cake
Win32.P2PWorm.Eggnog
Win32.P2PWorm.Lamerx
Win32.P2PWorm.Piron
Win32.P2PWorm.Poopoo
Win32.P2PWorm.Tofaced
Win32.Worm.Akim
Win32.Worm.Amus
Win32.Worm.Antiman
Win32.Worm.Bandet
Win32.Worm.Bizex
Win32.Worm.Charches
Win32.Worm.Delfer
Win32.Worm.Delinf
Win32.Worm.Dexter
Win32.Worm.Discoball
Win32.Worm.Diska
Win32.Worm.Frubee
Win32.Worm.Gunsan
Win32.Worm.Maliframe
Win32.Worm.Mash
Win32.Worm.Melare
Win32.Worm.Navup
Win32.Worm.Prex
Win32.Worm.Valcard
Win32.Worm.Valha
Win32.Worm.Vicex
Win32.Worm.Windaus
Win32.Worm.Volag
Win32.Worm.Zwur
Win32.Worm.IRCBot
Win32.Worm.Passma
Win32.Worm.FTPShare
Win32.Worm.Loosky
Win32.Worm.Winko
Win32.P2PWorm.Doep
Win32.Worm.Gedza

MISCELLANEOUS MALWARE This grouping contains other programs with malicious intentions.
Recipetoolbar Recipetoolbar is a search toolbar. The searches are made through http://www.fastseekers.com. The toolbar is installed an all user accounts and is missing both a privacy policy and EULA during the installation.
Win32.Hoax.Fera Win32.Hoax.Fera is a hoax application that can generate false security alerts that may warn users about potential spyware operations. The application may try to trick the user to download a rogue anti-spyware application. Win32.Hoax.Fera copies itself to several startup locations in order to load automatically at system startup.
Win32.Hoax.Welvirus Win32.Hoax.Welvirus is a joke program that may mimic the actions of other applications causing different forms of false alerts. It may also download other software automatically to the system, for example, rogue anti-spyware applications.
Win32.Hoax.Gavec Win32.Hoax.Gavec is a joke program that may mimic the actions of other applications causing different forms of false alerts. It may also download other software automatically to the system, for example, rogue anti-spyware applications.
Win32.Swf.Exploit Win32.Swf.Exploit are SWF or Flash files that are created in order to exploit vulnerabilities in the users' Flash Player.
Hacktool.WinLocker Hacktool.WinLocker locks up Windows by disabling key combinations (like alt+f4 and alt+tab). It will also remove the taskbar from view. Hacktool.WinLocker can be used to hijack a machine.
Win32.Rootkit.Clbd Win32.Rootkit.Clbd is malware that prevents its removal by hiding its presence by concealing running processes, files or data from the infected operating system. The malware may not be detected by system utilities, security related applications, or by users on the infected system. This malware may have to be removed manually. Affected users may seek further help at the Lavasoft Support Forums.
Win32.Rootkit.HideProc Win32.Rootkit.HideProc is malware that prevents its removal by hiding its presence by concealing running processes, files or data from the infected operating system. The malware may not be detected by system utilities, security related applications, or by users on the infected system. This malware may have to be removed manually. Affected users may seek further help at the Lavasoft Support Forums.
Win32.Rootkit.KernelBot Win32.Rootkit.KernelBot is malware that prevents its removal by hiding its presence by concealing running processes, files or data from the infected operating system. The malware may not be detected by system utilities, security related applications, or by users on the infected system. This malware may have to be removed manually. Affected users may seek further help at the Lavasoft Support Forums.
Win32.Rootkit.Qandr Win32.Rootkit.Qandr is malware that prevents its removal by hiding its presence by concealing running processes, files or data from the infected operating system. The malware may not be detected by system utilities, security related applications, or by users on the infected system. This malware may have to be removed manually. Affected users may seek further help at the Lavasoft Support Forums.

TAI - Threat Analysis Index
The Lavasoft Threat Analysis Index (TAI) system is based on a 10-point scale, with 1 representing the lowest threat and 10 representing the highest. The behavior of the program has more influence when assigning TAI points than the actual technical aspects of the malware. In other words, if the malware secretly attaches without the computer user's full understanding and approval, then it will automatically be given higher TAI points. A minimum TAI value of 3 is required before the malware is put into detection. Read more on the Lavasoft Security Center here.

Threat Analysis (TA) Index

 
  home
Keep your family safe with Ad-Aware 2008 Plus. Anti-Spyware + Anti-Virus! - 25% OFF
$19.95
Buy Now
Protection against over 1.2 million cyber threats!
Learn More
Forward to a Friend
Pass on the news, tips and offers in this issue – e-mail Lavasoft News to a friend.

73 Percentage of "tweens" – kids between the ages of 8 and 12 – who said their parents talk to them "a lot" about Internet security, according to a study from the National Center for Missing & Exploited Children.
Source: PCMag.com

Think Ad-Aware is one size fits all? Not so! Learn more about the choices you have when it comes to giving your favorite anti-spyware a look and feel that suits your taste.

Ad-Aware 2008 has landed TAMindir.com’s Editor’s Choice award with a five-star rating. Find out what the editors are saying about our software!

Lavasoft AB Lilla Bommen 1, 411 04 Gothenburg, Sweden | www.lavasoft.com | editor@lavasoft.com

Learn More